By: Muhammad Abbas, Luis Magsumbol, Peter Yambao & Eric Group - - PowerPoint PPT Presentation

by
SMART_READER_LITE
LIVE PREVIEW

By: Muhammad Abbas, Luis Magsumbol, Peter Yambao & Eric Group - - PowerPoint PPT Presentation

SEC625 Group Presentation By: Muhammad Abbas, Luis Magsumbol, Peter Yambao & Eric Group Plan Divided work Decided Services (Implementation) Calculation for VMs Windows or Linux Network Details Group Plan How to Divide


slide-1
SLIDE 1

SEC625 Group Presentation By: Muhammad Abbas, Luis Magsumbol, Peter Yambao & Eric

slide-2
SLIDE 2

Group Plan

■ Divided work ■ Decided Services (Implementation) ■ Calculation for VMs ■ Windows or Linux ■ Network Details

slide-3
SLIDE 3

Group Plan

■ How to Divide networks ■ Clients (How many?) ■ Windows or Linux ■ Client Access ■ Security as one

slide-4
SLIDE 4

Active Directory and DNS

■ Server 2008 R2 ■ Installed Microsoft Security Essentials ■ Updated the System ■ Updated Anti-Virus Definitions ■ Network Configuration (2 Networks)

slide-5
SLIDE 5

Active Directory and DNS

■ Networks (Intranet and Internet) ■ Change Local Admin name ■ Installed AD DS role ■ Created OUs and Users ■ Group Policies ■ Downloaded Wireshark

slide-6
SLIDE 6

Group Policies

■ Password Age (42 days) ■ Password Length (7 Characters) ■ Domain Wide ■ Hide last logged in User ■ Disable Command Prompt (Non-IT Departements)

slide-7
SLIDE 7

DHCP and Mail Server

■ Server 2008 R2 ■ Installed Microsoft Security Essentials ■ Network Configuration (Intranet and Internet) ■ Changed Local Administrator name ■ Joined Server to AD domain

slide-8
SLIDE 8

DHCP and Mail Server

■ DHCP leases different IPs ■ Mail configured only for internal use ■ Mail password different from AD ■ Passwords encrypted ■ Built-In Database

slide-9
SLIDE 9

Apache Server

■ Updated Linux operating system to latest version ■ Disabled unneeded services – firewalld.service, irqbalance.service, abrtd.service, polkit.service, smartd.service, wpa_supplicant.service, atd.service ■ Installed Logwatch ■ Logging and monitoring of system activity using Logwatch and default log files

slide-10
SLIDE 10

Apache Server

■ Installed latest version of Apache Package (httpd) ■ Added ‘ServerSignature Off’ and ‘ServerTokens Prod’ lines in config file – Hides operating system name and version from being shown by browser ■ Created index.html in Document Root – hides the listing of files in the directory, displayed by default

slide-11
SLIDE 11

Apache Server

■ Installed mod_security module – (firewall for web applications, monitor traffic real-time, protect from brute-force attacks) ■ Configured self-signed SSL: – installed mod_ssl module – made directory storing private key accessible only by root user – SSL key and certificate command: ■ openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/apache-selfsigned.key -out /etc/ssl/certs/apache-selfsigned.crt

slide-12
SLIDE 12

Apache Server (Specific Security)

■ Set up secure SSL parameters ■ Disabled info_module which can leak sensitive information using .htaccess

slide-13
SLIDE 13

Apache Server (Firewall)

■ Installed latest version of IPTABLES ■ Changed default policy to drop all traffic by default for all rules (rule of least privilege) ■ Only allow http port 80 and https port 443 traffic from within local network

slide-14
SLIDE 14

Apache Server

■ Documented changes for future reference ■ Apache server installed in it’s own machine and separated from other services (zoning) ■ If I had more time: – More research and configured Mod Security module – Improved logging by configuring mod_log_config module – Did more research and adjusted the timeout, maxclients, keepalivetimeout, limitrequestfields, and limitrequestfieldsize directives to protect against DDOS

slide-15
SLIDE 15

Client

■ Window 7 was what the group choose to use but the official website will redirect me to Window 10 instead ■ Windows update took several hours because I ended up downloading Window 7 from some other site and it is not updated ■ Getting our VM was problematic because I use VMware to install my client and the group use Virtual Box ■ When I install my Client I choose the default split virtual disk which made it very hard to import to Virtual Box

slide-16
SLIDE 16

Client

■ Client defenses are for blocking attacks that pass the perimeter or from the internal network ■ Things I have done to harden our clients include – Using local policies to limit and separate the standard user/admin account – Install/configure Antivirus software – Configure the Firewall to only allow services the group wants – Disable what is not being used ■ While all of these will provide a screen to attacks at best the point is to make it a little harder to attackers

slide-17
SLIDE 17

Samba

■ Initial Security Configurations – Update, Turn off unneeded services ■ Network Security – Firewall rules ■ Host Security – File Permissions, logwatch, strong user passwords ■ Application Security – Configuration file

slide-18
SLIDE 18

Firewall Server

■ Applying the rule of least privilege ■ Deny everything unless a rule matches ■ Configure logging to notice anomalies ■ Specify state, source, and destination addresses/ports for more focused firewall rules – Iptab ptables les –I (chain hain) –s I IP addr dres ess s –d IP address dress –sport t ## --

  • -dpor

port ## ## -m m conntrac nntrack –cts tsta tate NEW,R ,RELA LATED,E TED,ESTABLI BLISHE HED -j ACCEPT PT

slide-19
SLIDE 19

THANK YOU